Sciweavers

1406 search results - page 196 / 282
» Software trace cache
Sort
View
CHI
2005
ACM
14 years 9 months ago
Profile before optimizing: a cognitive metrics approach to workload analysis
The Intelligence Analyst (IA) community will soon be the designated users of many new software tools. In the multitasking world of the IA, any one tool cannot be permitted to gree...
Wayne D. Gray, Michael J. Schoelles, Christopher W...
FASE
2010
Springer
14 years 3 months ago
Are Popular Classes More Defect Prone?
Traces of the evolution of software systems are left in a number of different repositories: such as configuration management systems, bug tracking systems, mailing lists. Develope...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza
ISSTA
2009
ACM
14 years 3 months ago
Memory slicing
Traditional dynamic program slicing techniques are code-centric, meaning dependences are introduced between executed statement instances, which gives rise to various problems such...
Bin Xin, Xiangyu Zhang
ASWEC
2006
IEEE
14 years 3 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
IUI
2006
ACM
14 years 2 months ago
Are two talking heads better than one?: when should use more than one agent in e-learning?
Recent interest in the use of software character agents raises the issue of how many agents should be used in online learning. In this paper we review evidence concerning the rela...
Hua Wang, Mark H. Chignell, Mitsuru Ishizuka